"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-04-23 20:01:18 +00:00
parent bfa41a9942
commit dd651d4dff
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
7 changed files with 354 additions and 305 deletions

View File

@ -1,4 +1,3 @@
{
"CVE_data_meta": {
"ASSIGNER": "security@apache.org",
@ -75,7 +74,9 @@
"url": "https://security.gentoo.org/glsa/201903-21"
},
{
"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
"url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"refsource": "MISC",
"name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
}
]
}

View File

@ -1,17 +1,61 @@
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2019-10711",
"ASSIGNER": "cve@mitre.org",
"STATE": "RESERVED"
"ID": "CVE-2019-10711",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
"affects": {
"vendor": {
"vendor_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Incorrect access control in the RTSP stream and web portal on all IP cameras based on Hisilicon Hi3510 firmware (until Webware version V1.0.1) allows attackers to view an RTSP stream by connecting to the stream with hidden credentials (guest or user) that are neither displayed nor configurable in the camera's CamHi or keye mobile management application. This affects certain devices labeled as HI3510, HI3518, LOOSAFE, LEVCOECAM, Sywstoda, BESDER, WUSONGLUSAN, GADINAN, Unitoptek, ESCAM, etc."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"name": "https://dojo.bullguard.com/dojo-by-bullguard/blog/cam-hi-risk/",
"url": "https://dojo.bullguard.com/dojo-by-bullguard/blog/cam-hi-risk/"
}
]
}

View File

@ -34,7 +34,7 @@
"description_data": [
{
"lang": "eng",
"value": "lighttpd before 1.4.54 has a signed integer overflow, which might allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a malicious HTTP GET request, as demonstrated by mishandling of /%2F? in burl_normalize_2F_to_slash_fix in burl.c."
"value": "** DISPUTED ** lighttpd before 1.4.54 has a signed integer overflow, which might allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a malicious HTTP GET request, as demonstrated by mishandling of /%2F? in burl_normalize_2F_to_slash_fix in burl.c. NOTE: The developer states \"The feature which can be abused to cause the crash is a new feature in lighttpd 1.4.50, and is not enabled by default. It must be explicitly configured in the config file (e.g. lighttpd.conf). Certain input will trigger an abort() in lighttpd when that feature is enabled. lighttpd detects the underflow or realloc() will fail (in both 32-bit and 64-bit executables), also detected in lighttpd. Either triggers an explicit abort() by lighttpd. This is not exploitable beyond triggering the explicit abort() with subsequent application exit.\""
}
]
},

View File

@ -1,4 +1,3 @@
{
"CVE_data_meta": {
"ASSIGNER": "openssl-security@openssl.org",
@ -143,13 +142,15 @@
"name": "openSUSE-SU-2019:1175",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00047.html"
},
{
"url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"refsource": "MISC",
"name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20190423-0002/",
"url": "https://security.netapp.com/advisory/ntap-20190423-0002/"
},
{
"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
}
]
}

View File

@ -1,4 +1,3 @@
{
"CVE_data_meta": {
"ASSIGNER": "security_alert@emc.com",
@ -73,13 +72,15 @@
"refsource": "CONFIRM",
"url": "https://pivotal.io/security/cve-2019-3772"
},
{
"url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"refsource": "MISC",
"name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
},
{
"refsource": "BID",
"name": "106749",
"url": "http://www.securityfocus.com/bid/106749"
},
{
"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
}
]
},

View File

@ -1,4 +1,3 @@
{
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
@ -109,7 +108,9 @@
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-436177.pdf"
},
{
"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
"url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"refsource": "MISC",
"name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
}
]
}

View File

@ -1,4 +1,3 @@
{
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
@ -104,7 +103,9 @@
"url": "https://lists.apache.org/thread.html/8338a0f605bdbb3a6098bb76f666a95fc2b2f53f37fa1ecc89f1146f@%3Cdevnull.infra.apache.org%3E"
},
{
"url":"https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
"url": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html",
"refsource": "MISC",
"name": "https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html"
}
]
}